GB2527518A - Communication system - Google Patents

Communication system Download PDF

Info

Publication number
GB2527518A
GB2527518A GB1411149.6A GB201411149A GB2527518A GB 2527518 A GB2527518 A GB 2527518A GB 201411149 A GB201411149 A GB 201411149A GB 2527518 A GB2527518 A GB 2527518A
Authority
GB
United Kingdom
Prior art keywords
base station
communication device
mobile communication
message
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB1411149.6A
Other versions
GB201411149D0 (en
Inventor
Meng Wang
Yoshio Ueda
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC Corp
Original Assignee
NEC Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NEC Corp filed Critical NEC Corp
Priority to GB1411149.6A priority Critical patent/GB2527518A/en
Publication of GB201411149D0 publication Critical patent/GB201411149D0/en
Priority to US15/318,827 priority patent/US20170134996A1/en
Priority to JP2016575244A priority patent/JP6292427B2/en
Priority to EP15736058.7A priority patent/EP3158784A1/en
Priority to PCT/JP2015/068595 priority patent/WO2015199241A1/en
Priority to CN201580034346.6A priority patent/CN106416334A/en
Publication of GB2527518A publication Critical patent/GB2527518A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0433Key management protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0033Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
    • H04W36/0038Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information of security context information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link
    • H04W36/0072Transmission or use of information for re-establishing the radio link of resource information of target access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/34Reselection control
    • H04W36/38Reselection control by fixed network equipment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/042Public Land Mobile systems, e.g. cellular systems
    • H04W84/045Public Land Mobile systems, e.g. cellular systems using private Base Stations, e.g. femto Base Stations, home Node B
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/16Gateway arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A communication system is disclosed comprising a gateway connecting a source base station and a target base station. The gateway receives a message from the source base station initiating a handover of a mobile device from the source to the target base station. The received message comprises a security context (an NCC-K,NB pair and/or aKeNR*) for securing communications with the mobile device, and for deriving a further key for securing subsequent communications with the mobile device. The gateway generates and sends, to the target base station, a message requesting the target base station to carry out a handover, the message comprising the security context and a current value of an associated counter for deriving a further key for securing subsequent communications with the mobile communication device.

Description

Communication System The present invention relates to a communication system and to components thereof for providing communication services to mobile or fixed communication devices. The invention has particular but not exclusive relevance to the implementation of a so-called home base station (HeNB) gateway (a gateway that connects small' cells or Low Power Nodes (LPNs) to a core network) in Long Term Evolution (LTE) communication systems currently being developed by the 3rd Generation Partnership Project (3GPP).
In 3GPP LIE networks, a base station (i.e. evolved NodeB, eNB) of a Radio Access Network (RAN) transmits data and signalling between a core network (ON) and User Equipment (UEs) located within the base station's coverage area. In LIE, the RAN is referred to as the Evolved Universal Terrestrial Radio Access (E-UTRA) network (E-UIRAN) and the core network is referred to as the Evolved Packet Core (EPG) network.
User equipment may comprise, for example, mobile telephones, mobile communication devices, user communication devices, laptop computers, and/or the like.
Recent developments in communication networks have seen increased deployment of so called small' cells operated by Low Power Nodes (LPNs), such as pico eNBs, femto eNBs, Home eNBs (HeNB5) or the like, which cells have a smaller coverage area than existing macro cells operated by a higher power macro base station. Networks comprising a number of different cell types, for example a network comprising a macro cell and a femto cell, are referred to as Heterogeneous Networks, or HetNets.
The LANs I small cell base stations that operate small cells can typically communicate with the core network and with macro base stations via a small cell gateway. Some small cell gateways have a so-called home evolved nodeB gateway (HeNB GW) functionality to provide connectivity from the LPNIsmall cell base station to the core network, although such connectivity from the LPN/small cell base station to the core network may also be provided directly, e.g. without requiring any HeNB GVV functionality.
More recently the need to make further enhancements to small cells using low-power nodes has been identified as one of the most important topics for further development of 3GPP standards compliant communication systems in order to enable such communication systems to cope with increases in mobile traffic especially for hotspot deployments in indoor and outdoor scenarios. According to this interest in small cell enhancements, scenarios and requirements for small cell enhancements were studied and captured in a 3GPP technical report (3GPP TR 36.932), the contents of which are herein incorporated by reference.
In such deployment scenarios, possibly involving a large number of base stations (of various types), the volume of signalling in the communication system may be significant.
In order to address this issue, some of the core network functionalities, e.g. handover related functionalities may be provided by a HeNB GW instead of a core network entity (e.g. a mobility management entity, MME). Typically, the handover related functionalities may be provided by a HeNB GW when both the old (source) and the new (target) base station are connected to the same HeNB SW. This approach reduces the amount of signalling that needs to be exchanged between the core network and the access network (HeNB GW and/or base stations) during handover and thus improves the overall system efficiency.
Whenever an item of user equipment (e.g. a mobile telephone) is handed over between base stations, (the corresponding endpoint of) the associated SI' connection (i.e. the communications link between the user equipment's serving base station and the core network) is handed over as well, from the source base station to the target base station.
Such an Si handover involves the provision of a new cryptographic key for the target base station, which is assisted by the MME sending input information (known as security context) to the target base station, based on which the target base station can derive its own cryptographic key (referred to as the KeN6*, whilst the KeN6 denotes the cryptographic key used by the old, i.e. the source base station).
Specifically, the security context sent by the MME includes the current cryptographic key(s) and chaining information for the next hop (i.e. the target base station) access key derivation. The cryptographic key (of the source base station) comprises the KONB and the chaining information comprises the Next Hop Parameter (NH) and the NH Chaining Counter (NCC). Using the received cryptographic keys and chaining information, together with its own Physical Cell Identity (PCI) and E-UTRA Absolute Radio Frequency Channel Number (EARFCN), the target base station is able to derive the KeNE to be used in subsequent communications with the mobile communication device that has been handed over.
However, there is a problem when the handover is performed without involving the MME, because the required security context cannot be provided from the MME to the target base station, simply because the HeNB SW does not communicate with the MME during a handover between two base stations connected to that HeNB GW. This might result in the user equipment and the target base station being unable to communicate with each other (and/or with the core network) until a new, valid security key is derived by the target base station. However, as described above, this usually requires additional signalling between the target base station and the MME, in the absence of which it may not be possible to support secure (encrypted) communications for the user equipment via the target base station (at least until the appropriate KeNB* is derived by the target base station).
Accordingly, preferred embodiments of the present invention aim to provide methods and apparatus which overcome or at least alleviate the above issues without necessitating additional signalling towards the core network.
In one aspect, the invention provides a base station for a communication system, the communication system comprising a mobile communication device, a plurality of base stations, a gateway apparatus operable to facilitate communication of messages between said plurality of base stations, and an mobility management entity via which the gateway apparatus can be connected to a core network, the base station comprising: means for generating a message for initiating a handover of said mobile communication device from said base station to a further base station of said plurality of base stations, the message comprising a security context associated with said mobile communication device, the security context including: a key for securing communications with said mobile communication device; and a current value of an associated counter for deriving a further key for securing subsequent communications with said mobile communication device. The base station comprises means for communicating the generated message to said gateway apparatus, the message including said security context.
In one aspect, the invention provides a base station for a communication system, the communication system comprising a mobile communication device, a plurality of base stations, a gateway apparatus operable to facilitate communication of messages between said plurality of base stations, and an mobility management entity via which the gateway apparatus can be connected to a core network, the base station comprising: means for generating a message for initiating a handover of said mobile communication device from said base station to a further base station of said plurality of base stations, the message comprising information for identifying a cell and information for identifying a channel of said further base station, wherein said information is included in one or more non-radio resource control (non-RRC) encoded information elements configured to convey cell information between said base station and other nodes of said communication system; and means for communicating said generated message to said gateway apparatus, the message including said one or more non-RRC encoded information elements.
In one aspect, the invention provides a base station for a communication system, the communication system comprising a mobile communication device, a plurality of base stations, a gateway apparatus operable to facilitate communication of messages between said plurality of base stations, and an mobility management entity via which the gateway apparatus can be connected to a core network, the base station comprising: means for receiving a message from said gateway apparatus, the message requesting the base station to carry out a handover of said mobile communication device from another base station of said plurality of base stations, the message comprising a security context associated with said mobile communication device, the security context including: a key for securing communications with said mobile communication device; and a current value of an associated counter for deriving a further key for securing subsequent communications with said mobile communication device. The base station comprises means for performing said requested handover of said mobile communication device; and means for securing communications with said mobile communication device using said received key.
In one aspect, the invention provides a gateway apparatus for facilitating communication of messages between a plurality of base stations and a core network, the gateway apparatus comprising: means for receiving a message, from a first base station of plurality of base stations, for initiating a handover of a mobile communication device from said first base station to a second base station of said plurality of base stations, the received message comprising: (a) data to be forwarded to said second base station, said data relating to said handover of said mobile communication device from said first base station to said second base station; (b) a security context associated with said mobile communication device, the security context including: a key for securing communications with said mobile communication device; and a current value of an associated counter for deriving a further key for securing subsequent communications with said mobile communication device. The gateway apparatus comprises means for generating a message requesting said second base station to carry out a handover of said mobile communication device from said first base station, the generated message comprising information for deriving a further key for securing communications with said mobile communication device, wherein said information for deriving a further key is included in a security context portion forming part of said generated message; and means for sending said generated message to said second base station.
In one aspect, the invention provides a gateway apparatus for facilitating communication of messages between a plurality of base stations and a core network, the gateway apparatus comprising: means for obtaining, from a core network node, a security context associated with a mobile communication device, the security context including: a key for securing communications with said mobile communication device; and a current value of an associated counter for deriving a further key for securing subsequent communications with said mobile communication device; means for receiving a message, from a first base station of plurality of base stations, for initiating a handover of said mobile communication device from said first base station to a second base station of said plurality of base stations, the received message comprising data to be forwarded to said second base station, said data relating to said handover of said mobile communication device from said first base station to said second base station; means for generating information for deriving a further key for securing communications with said mobile communication device; means for generating a message requesting said second base station to carry out a handover of said mobile communication device from said first base station, the generated message comprising said information for deriving a further key for securing communications with said mobile communication device, wherein said information is included in a security context portion forming part of said generated message; and means for sending said generated message to said second base station.
In one aspect, the invention provides a communication system comprising one or more of the above describe base station; and the above described gateway apparatus.
In one aspect, the invention provides a method performed by a base station in a communication system, the communication system comprising a mobile communication device, a plurality of base stations, a gateway apparatus operable to facilitate communication of messages between said plurality of base stations, and an mobility management entity via which the gateway apparatus can be connected to a core network, the method comprising: generating a message initiating a handover of said mobile communication device from said base station to a further base station of said plurality of base stations, the message comprising a security context associated with said mobile communication device, the security context including: a current key for securing communications with said mobile communication device; and a current value of an associated counter for deriving a further key for securing subsequent communications with said mobile communication device; and communicating said generated message to said gateway apparatus, the message including said security context.
In one aspect, the invention provides a method performed by a base station in a communication system, the communication system comprising a mobile communication device, a plurality of base stations, a gateway apparatus operable to facilitate communication of messages between said plurality of base stations, and an mobility management entity via which the gateway apparatus can be connected to a core network, the method comprising: generating a message for initiating a handover of said mobile communication device from said base station to a further base station of said plurality of base stations, the message comprising information for identifying a cell and information for identifying a channel of said further base station, wherein said information is included in one or more non-radio resource control (non-RRC) encoded information element configured to convey cell information between said base station and other nodes of said communication system; and communicating said generated message to said gateway apparatus, the message including said one or more information elements.
In one aspect, the invention provides a method performed by a base station in a communication system, the communication system comprising a mobile communication device, a plurality of base stations, a gateway apparatus operable to facilitate communication of messages between said plurality of base stations, and an mobility management entity via which the gateway apparatus can be connected to a core network, the method comprising: receiving a message from said gateway apparatus, the message requesting the base station to carry out a handover of said mobile communication device from another base station of said plurality of base stations, the message comprising a security context associated with said mobile communication device, the security context including: a key for securing communications with said mobile communication device; and a current value of an associated counter for deriving a further key for securing subsequent communications with said mobile communication device; performing said requested handover of said mobile communication device; and securing communications with said mobile communication device using said received key.
In one aspect, the invention provides a method performed by a gateway apparatus, the method comprising: receiving a message from a first base station of plurality of base stations, the message initiating a handover of a mobile communication device from said first base station to a second base station of said plurality of base stations, the received message comprising: (a) data to be forwarded to said second base station, said data relating to said handover of said mobile communication device from said first base station to said second base station; (b) a security context associated with said mobile communication device, the security context including: a key for securing communications with said mobile communication device; and a current value of an associated counter for deriving a further key for securing subsequent communications with said mobile communication device; generating a message requesting said second base station to carry out a handover of said mobile communication device from said first base station, the generated message comprising information for deriving a further key for securing communications with said mobile communication device, wherein said information for deriving a further key is included in a security context portion forming part of said generated message; and sending said generated message to said second base station.
In one aspect, the invention provides a method performed by a gateway apparatus, the method comprising: obtaining, from a core network node, a security context associated with a mobile communication device, the security context including: a key for securing communications with said mobile communication device; and a current value of an associated counter for deriving a further key for securing subsequent communications with said mobile communication device; receiving a message from a first base station of plurality of base stations, the message initiating a handover of said mobile communication device from said first base station to a second base station of said plurality of base stations, the received message comprising data to be forwarded to said second base station, said data relating to said handover of said mobile communication device from said first base station to said second base station; generating information for deriving a further key for securing communications with said mobile communication device; generating a message requesting said second base station to carry out a handover of said mobile communication device from said first base station, the generated message comprising said information for deriving a further key for securing communications with said mobile communication device, wherein said information is included in a security context portion forming part of said generated message; and sending said generated message to said second base station.
Aspects of the invention extend to computer program products such as computer readable storage media having instructions stored thereon which are operable to program a programmable processor to carry out a method as described in the aspects and possibilities set out above or recited in the claims and/or to program a suitably adapted computer to provide the apparatus recited in any of the claims.
Although for efficiency of understanding for those of skill in the art, the invention will be described in detail in the context of a 3G system (UMIS, LIE), the principles of the invention can be applied to other systems (such as WiMAX) in which (home/small cell) base stations communicate via a signalling gateway with the corresponding elements of the system changed as required.
Embodiments of the invention will now be described, by way of example, with reference to the accompanying drawings in which: Figure 1 schematically illustrates a mobile telecommunication system of a type to which the invention is applicable; Figure 2 is an overview of a key derivation procedure which may be applied in the system shown in Figure 1; Figure 3 is a block diagram illustrating the main components of a base station forming part of the system shown in Figure 1; Figure 4 is a block diagram illustrating the main components of a small cell gateway forming part of the system shown in Figure 1; Figure 5 is a block diagram illustrating the main components of a mobility management entity forming part of the system shown in Figure 1; and Figures 6 to 11 are exemplary timing diagrams illustrating methods performed by components of the system of Figure 1 whilst carrying out embodiments of the invention.
Overview Figure 1 schematically illustrates a mobile (cellular) telecommunication system I including a mobile communication device 3 comprising a mobile telephone (or other compatible user equipment) and a plurality of base stations 5-i to 5-3, each of which operates an associated cell 6-1 to 6-3. Any of the base stations 5-1 to 5-3 may comprise a regular macro eNB and/or a small cell base station (such as Home evolved NodeB (HeNB), pico or femto base station, and/or the like).
In this example, the mobile communication device 3 is served via a cell 6-1 operated by one of the base stations 5-1. As those skilled in the art will appreciate, whilst one mobile communication device 3 and three base stations 5 are shown in Figure 1 for illustration purposes, additional user equipment and/or base stations may be present in a deployed system.
Communication between the base stations Sand a core network 7 is via a so-called Si, interface. The core network 7 includes a mobility management entity 9 (MME), a serving gateway (S-GW) Ii (and other communication entities such as a Packet Data Network (PDN) Gateway (PGV, which have been omitted for sake of simplicity). The MME 9 includes a so-called Access Security Management Entity (ASME), which is responsible for deriving the cryptographic keys (KeNB / KeNB*) to be used between the base stations 5 and user equipment 3 served by the base stations 5.
The HeNB GW 8 is connected to the MME 9 using the S1-MME interface and to the 5-GVV ii using the Si-U interface, thus providing an appropriate control-plane (S1-MME) and user-plane (Si -U) connectivity for the mobile communication device 3 and the base stations 5. An X2' interface is also provided for communication between neighbouring base stations 5 to facilitate data exchange between them. In this example, a small cell gateway 8 (denoted HeNB-GW) is provided to implement the functionality of an X2 gateway, thus communications between the base stations 5 over the X2 interface are routed via the HeNB GW 8 (rather than routing them directly). The HeNB GW 8 may also be connected to the other networks (e.g. the core network 7), for operations and maintenance (OAM) purposes, and/or the like.
In this system, when the mobile communication device 3 needs to be handed over between two base stations 5 (e.g. base station 5-1 as the source base station and base station 5-2 as the target base station) that are connected to the same HeNB GW 8, the source and target base stations 5-1, 5-2 and the HeNB OW 8 are configured to carry out a handover procedure without requiring the MME 9 to provide a security context for the target base station 5-2 (which would normally be required in accordance with TS 36.401 and TS 36.413).
This is possible because the HeNB GVV 8 is configured to obtain the current cryptographic key (KeNB) and NCC directly from the source base station 5-1 (rather than from the MME 9). Specifically, the current KeNB and NCC are obtained by the HeNB GW 8 from a message by the source base station 5-1 indicating that a handover is required.
For example, the source base station 5-1 may include the current KeNE and NCC in an appropriately formatted RRC container information element or transparent container information element (source eNB to target eNB transparent container information element). Further, the HeNS GVV 8 is configured to provide the obtained information to the target base station 5-2 when it requests the target base station 5-2 to carry out the handover (e.g. by sending an appropriately formatted SI signalling message). In this case, the target base station 5-2 is therefore able to derive the updated cryptographic key (KeNE*) using the current KeNB received from the source base station 5-1 (via the HeNB GW 8), and the information specific to the target base station (PCI and EARFCN), and to apply the updated key to the mobile communication device's 3 communications via the target base station 5-2 after completion of the requested handover.
Alternatively, the HeNS GW 8 may be configured to derive the target base station's 5-2 cryptographic key (instead of the target base station 5-2) using information obtained from the base stations 5 and/or the MME 9. Specifically, the HeNB GW 8 may be configured to obtain the applicable PCI and EARFCN information corresponding to the base station 5-2 from a message (e.g. an Si signalling message) setting up the base station 5-2 for communication via the HeNS GW 8 (e.g. a message setting up an Si connection for the base station 5-2). The HeNB GW 8 may also be configured to obtain the applicable PCI and EARFCN information corresponding to the base station 5-2 by communicating with an DAM entity. The HeNS GW 8 may also be configured to obtain and cache the current cryptographic key (KeNB) used by the base station 5-1, e.g. from a message (such as an Si signalling message, e.g. a handover request' message, a path switch request' message, and/or the like) sent by the MME 9 to the base station 5- 1 (via the HeNB GW8).
Therefore, using the obtained PCI and EARFCN information (obtained from the base station 5-1/5-2 or from the DAM entity) which uniquely identify the target base station 5- 2, and also the source base station's 5-1 current cryptographic key (KeNB) and NCC (obtained from the base station 5-1 or the MME 9), the HeNB 3W 8 is able to derive the cryptographic key (KeNB*) specific to the target base station and forward the derived cryptographic key (KeNB*) to the target base station 5-2. For example, the HeNS 3W 8 may be configured to provide the derived cryptographic key to the target base station 5- 2 in a signalling message requesting the target base station 5-2 to carry out the handover initiated by the source base station 5-1. Thus when the target base station 5-2 complies with the HeNB GVV's 8 handover request, it is able to apply the appropriate cryptographic key (new KeNB) without having received any security context from the MME 9 (during the handover to the target base station 5-2) and without having to derive the target base station specific cryptographic key itself.
In a modification of this method, the source base station 5-1 may be configured to derive the target base station's 5-2 new KeNB (since it already knows the target base station's 5- 2 PCI and EARFCN information) and send the new KeNB to the target base station 5-2 via the HeNB OW 8. In this case, the new KeNB may be communicated between the base stations 5-1, 5-2 (via the HeNB OW 8) using an appropriately formatted RRC container information element or a transparent container information element (source eNB to target eNB transparent container information element) included in the signalling (e.g. Si signalling) associated with the handover. Beneficially, with this modification, the target base station 5-2 is not required to calculate the KeNB.
Thus, beneficially, the signalling between the base stations 5 and the core network 7 and/or between the HeNB OW 8 and the core network 7 can be reduced compared to conventional handover scenarios in which the MME 9 needs to provide the associated security context even when both the source base station 5-1 and the target base station 5-2 are connected to the same HeNB GW 8. Further, since the HeNB GW 8 does not need to wait for the receipt of any security context from the MME 9, it is possible to perform the handover procedure with less delay than using other methods involving the core network 7 and/or the MME 9.
Key handling in handover Before discussing the above scenarios in more detail, it is helpful to set out the general principle of key handling at handover in LIE systems. Figure 2 gives an overview of the horizontal key derivation procedure which may be applied in the system shown in Figure I in order to derive the target base station specific KeNB* key when the mobile communication device 3 is being handed over between the base stations 5. Further details of the key derivation procedure can be found in section 7.2.8 of 3GPP TS 33.401 V12.10.0, the contents of which are hereby incorporated by reference.
The general principle of key handling at handovers is depicted in Figure 2, which corresponds to Figure 7.2.8.1-1 of 3GPP 15 33.401. The following is an outline of the key handling model to clarify the structure of the key derivations. Sections 7.2.8.3 and 7.2.8.4 of 3GPP TS 33.401 V12.10.0 provide a more detailed specification, the contents of which are summarised below.
Whenever an initial AS security context needs to be established between the mobile communication device 3 and a base station 5, the MME 9 and the mobile communication device 3 derive a KeND and a Next Hop parameter (NH). The KeND and the NH are derived from the KASME stored at the MME 9. A NH Chaining Counter (NCC) is associated with each KeNB and NH parameter. Every KeNB is associated with the NCC corresponding to the NH value from which it was derived. At initial setup, the KeNB is derived directly from the KASME, and it is then considered to be associated with a virtual NH parameter with NCC value equal to zero. At initial setup, the derived NH value is associated with the NCC value one.
The MME 9 does not send the NH value to the base station 5 at the initial connection setup. Instead, the base station 5 initialises the NCC value to zero after receiving an 51-AP Initial Context Setup Request message. According to TS 33.401, the MME 9 always computes a fresh (NH, NCC} pair that is given to the target base station 5. An implication of this is that the first (NH, NCC} pair will never be used to derive a KeNB. It only serves as an initial value for the NH chain.
The mobile communication device 3 and the base station 5 use the KeN8 to secure the communication between each other. On handovers, the basis for the KeNB that will be used between the mobile communication device 3 and the target base station 5, called KeNB*, is derived from either the currently active KeNB or from the NH parameter. If KeNB* is derived from the currently active KeNB this is referred to as a horizontal key derivation and if the KONR* is derived from the NH parameter the derivation is referred to as a vertical key derivation. On handovers with vertical key derivation the NH is further bound to the target PCI and its (downlink) frequency EARFCN before it is taken into use as the KeNB in the target base station 5. On handovers with horizontal key derivation the currently active KeNB is further bound to the target PCI and its (downlink) frequency EARFCN before it is taken into use as the KeNB in the target base station 5.
As NH parameters are only computable by the mobile communication device 3 and the MME 9, the NH parameters are provided to the base stations 5 from the MME 9 in such a way that forward security can be achieved.
As part of the handover procedure, the (target) base station 5 derives the KeNB* using its PCI, its (downlink) frequency EARFCN, and either the NH or the current KeNB depending on the following criteria: the base station 5 uses the NH for deriving KeNB* if an unused {NH, NCC} pair is available in the base station 5 (vertical key derivation), otherwise if no unused {NH, NCC} pair is available in the base station 5, the base station 5 derives KeNB* from the current KeNB (horizontal key derivation). The base station 5 uses the derived KeNB* as the KeNB after handover. The base station 5 sends the NCC used for KeNB* derivation to the mobile communication device 3 in a HO Command message so that the mobile communication device 3 can also derive the same the KeNB* and hence the mobile communication device 3 is able to continue communicating via the base station 5 after the handover.
The mobile communication device 3 checks whether the received NCC value (in the HO Command message from target base station 5) is equal to the NCC value associated with the currently active KON6. If the received and current NCC values are equal, the mobile communication device 3 derives the KeNE from the currently active KeNB and the target PCI and (downlink) frequency EARFCN using the key derivation function illustrated in Figure 2.
However, if the mobile communication device 3 received an NCC value that is different to the NCC associated with the currently active KeNB, the mobile communication device 3 first synchronises the locally kept NH parameter by computing the function defined in Annex A.4 of IS 33.401 iteratively (increasing the NCC value until it matches the NCC value received from the base station 5 in the HO command message). When the NCC values match, the mobile communication device 3 computes the KeNB* from the synchronised NH parameter, the target PCI, and the (downlink) frequency EARFCN.
In summary, following either of the above described procedures, the mobile communication device 3 is able to derive and use the appropriate target base station specific KeN6* for communicating with the target base station 5 after the handover.
Base Station Figure 3 is a block diagram illustrating the main components of one of the base stations shown in Figure 1, such as the source base station 5-i. As shown, the base station 5 includes transceiver circuit 51 which is operable to transmit signals to, and to receive signals from, the mobile communication device 3 via at least one antenna 53. The base station 5 is also operable to transmit signals to and to receive signals from nodes in the core network 7 (such as the MME 9 or the 5GW Ii), either directly or via a small cell gateway (e.g. the HeNB GW 8), using a network (SI) interface 54. The base station 5 is also operable to transmit signals to and to receive signals from other base stations (macro or small) either directly or via the HeNS OW 8 using an eNS (X2) interface 55.
The operation of the transceiver circuit 51 is controlled by a controller 57 in accordance with software stored in memory 59. The software includes, among other things, an operating system 61, a communication control module 63, an Si-AR module 65, an X2-AR module 67, and a security module 69.
The communication control module 63 controls communications between the base station 5 and the mobile communication device 3, and between the base station 5 and the network devices such as the MME 9, SGW 11, and other base stations 5 (e.g. via the HeNB GWB).
The SI-AR module 65 handles SI signalling (e.g. generates, sends, and receives messagesIPDUs formatted in accordance with the SI protocol) between the base station and the MME 9 (via the HeNB GW8).
The X2-AP module 67 handles X2 signalling (e.g. generates, sends, and receives messages/PDU5 formatted in accordance with the X2 application protocol) between the base station 5 and other (target) base stations, either directly or via the HeNB GW 8.
The security module 69 is responsible for securing communications via the base station (e.g. between the core network 7 and user equipment 3). When the base station 5 is a handover target, the security module 69 obtains (e.g. via the S1-AP module 65) parameters (e.g. one or more of: KeNB/KeNB*, NOC, PCI, and EARFCN) from the source base station and/or the HeNS OW 8, and using the obtained parameters, the security module 69 derives/applies an associated cryptographic key for securing communications via the base station 5. When the base station S is a handover source, the security module 69 provides (e.g. via the Si-AR module 65) parameters (e.g. one or more of: KeNB/KeNB*, NCC, PCI, and EARFCN) for deriving an associated cryptographic key for securing communications via the target base station.
Small Cell Gateway Figure 4 is a block diagram illustrating the main components of the HeNB GW 8 shown S in Figure 1. As shown, the HeNB GW 8 includes transceiver circuit 71 which is operable to transmit signals to, and to receive signals from, core network entities (e.g. the MME 9 and/or the S-GVV 11) via a network (Si) interface 74, and which is operable to transmit signals to, and to receive signals from, base stations 5 via an eNB (X2) interface 75. The operation of the transceiver circuit 71 is controlled by a controller 77 in accordance with software stored in memory 79. The software includes, among other things, an operating system 81, a communication control module 83, an SI-AR module 85, an X2-AP module 87, an optional operations and maintenance (CAM) module 88, and a security module 89.
The communication control module 83 is operable to control communications between the HeNB GW 8 and the core network via the core network interface 74 and between the HeNB GW 8 and the base stations S via the eNB interface 75.
The SI-AR module 85 handles SI signalling (e.g. generates, sends, and receives messages/PDU5 formatted in accordance with the Si protocol) between the HeNB GW 8 and the MME 9, and between the HeNB GW 8 and the connected base stations 5.
The X2-AR module 87 handles X2 signalling (e.g. generates, sends, and receives messages/PDUs formatted in accordance with the X2 application protocol) between the base station 5 and the HeNB GVV 8.
If present, the OAM module 88 communicates with an OAM entity (e.g. in the core network 7) in order to obtain information (e.g. PCI, EARFCN) associated with the base stations 5 connected to the HeNB GVV 8, and to provide the obtained information to the security module 89, when appropriate.
The security module 89 is responsible for ensuring that the connected base stations' 5 communications (e.g. with the core network 7 and/or the user equipment 3) are secured (encrypted using an appropriate cryptographic key). In a handover scenario managed by the HeNB 3W 8 without involving the MME 9, the security module 89 obtains (e.g. via the Si-AR module 85) from the source base station parameters (e.g. one or more of: KeNB/KeNB*, NCC, PCI, and EARFCN) required for deriving an associated cryptographic key for securing communications via the target base station. Some of this information (e.g. current KeNB, NOC) may also be obtained from memory 79, e.g. if previously obtained from the MME 9 and cached by the HeNB GW 8 locally. The security module 89 may be configured to derive the associated cryptographic key itself (in which case it provides the derived cryptographic key, KeNB*, to the target base station) or to provide the obtained parameters (e.g. one or more of: KeNB/KeNB*, NCC, PCI, and EARFCN) for deriving the associated cryptographic key at the target base station.
Mobility management entity Figure 5 is a block diagram illustrating the main components of the MME 9 shown in Figure 1. As shown, the MME 9 includes transceiver circuitry 91 which is operable to transmit signals to, and to receive signals from, other network nodes such as the mobile communication device 3, the base stations 5, and/or the HeNB GW 8 via a network (Si) interface 95. The operation of the transceiver circuit 91 is controlled by a controller 97 in accordance with software stored in memory 79. The software includes, among other things, an operating system 101, a communication control module 103, an Si-AR module 105, an optional UE location module 107, and a security module 109.
The communication control module 103 is operable to control communications between the MME 9 and the HeNS GVV 8, the base stations 5, and the mobile communication device 3 via the network interface 95.
The 51-AR module 105 handles Si signalling (e.g. generates, sends, and receives messages/PDU5 formatted in accordance with the Si protocol) between the MME 9 and the HeNB GW8, and between the MME 9 and the base stations 5.
If present, the UE location module 107 is responsible for keeping track of the current locations of each mobile communication device 3 served by the MME 9. The UE location module 107 is configured to obtain (e.g. via the Si-AR module 105) location updates from the target base station 5 to which the mobile communication device 3 is handed over. Such location updates may be provided by the target base station 5 using any suitable signalling message, e.g. a Handover Notify' and/or a Location Report' message formatted in accordance with the Si protocol.
The security module 109 is responsible for ensuring that communications between the network nodes (e.g. the mobile communication device 3, the base stations 5, and the HeNB GVV 8) are secure (encrypted). The security module 109 includes the so-called Access Security Management Entity (ASME) functionality as specified in the relevant 33FF standards. When the MME 9 receives a handover required message from the HeNB 3W 8 or the source base station 5, the security module 109 provides the so-called security context to the target base station identified in the handover required message. However, when the MME 9 receives a location update from the HeNB 3W 8 indicating that a mobile communication device 3 has been handed over to a new base station 5 (without receiving an associated handover required message), the security module 109 / ASME functionality does not need to provide a security context to the new base station, since in this case the base stations 5 and the HeNB 3W 8 are able to derive the required cryptographic key without involving the MME 9.
In the above description, the base station 5, the HeNB 6W 8, and the MME 9 are each described for ease of understanding as having a number of discrete modules (such as the communication control modules, the Si-AR modules, and the security modules).
Whilst these modules may be provided in this way for certain applications, for example where an existing system has been modified to implement the invention, in other applications, for example in systems designed with the inventive features in mind from the outset, these modules may be built into the overall operating system or code and so these modules may not be discernible as discrete entities. These modules may also be implemented in software, hardware, firmware or a mix of these.
Operation -first embodiment Figure 6 is an exemplary timing diagram illustrating a method performed by components of the mobile telecommunication system I of Figure 1 whilst carrying out an embodiment of the invention.
The process begins in step S603, in which the source base station 5-i indicates to the HeNB 6W 8 that the mobile communication device 3 needs to be handed over to the target base station 5-2. The source base station 5-i does so by generating (using its Si-AR module 65) and sending an appropriately formatted signalling message (e.g. a Handover Required' Si-AR message) to the HeNB 6W 8. The source base station 5-1 includes in this message the security context (i.e. the current KeNB and NCC) applicable at the source base station 5-1. The security context may be included in e.g. any suitable portion of the message sent at S603, such as an extension portion that can be understood by the target base station 5-2. The extension' portion in this example comprises an appropriately formatted RRC container information element or a transparent container information element (e.g. a source eNB to target eNB transparent container' information element). Since the source base station 5-1 cannot tell whether the target base station 5-2 is also connected to the same HeNB 3W 8, thus it is not possible to tell in advance whether the handover will involve the MME 9 or not, the HeNB 3W 8 includes in this message the regular' security context information element (IE) instead of the MME 9, in addition to including the current KeNB and NCC in the extension portion by source base station 5-I.
In response to this message indicating that a handover is required, the HeNB 3W 8 generates (using its SI-AR module 85) and sends, in step S606, an appropriately formatted signalling message (e.g. a Handover Request' Si-AP message) requesting the target base station 5-2 to perform a handover for the mobile communication device 3 (identified in the request), to the target base station's 5-2 The HeNB 3W 8 also includes in this message the applicable security context (i.e. the current KeNB and NCC) received from the source base station 5-1 at 5603 -for example, by adding the RRC container information element or transparent container information element received from the source base station 5-1.
In step S607, the target base station 5-2 (using its Si-AP module 65) checks and compares the NCC value in the security context IE (included in the message received at S606) to determine whether it is the same as the NOC value included in the extended part of the message from the HeNB 3W 8. If the NCC values are the same, the target base station 5-2 ignores any KeNB included in the security context IE and adopts the KeNB included in the extended part. If the NCC values are different, the target base station 5-2 adopts the KeNB included with the most recent NCC and ignores any KeNB included with the other NCC.
Next, as shown in step 5608, the target base station 5-2 (using its security module 69) derives the KeNB* (target base station specific KeNB*) to be applied (i.e. after the handover has been successfully completed) for the base station's 5-2 subsequent communications with the mobile communication device 3.
If the target base station 5-2 is able to comply with the handover request, then it generates (using its SI-AR module 65) and sends, in step S609, an appropriately formatted acknowledgement message (e.g. a Handover Request Ack' Si-AP message) to the HeNB 6W 8.
In step 5610, the HeNB GW 8 forwards the target base station's 5-2 handover command to the source base station 5-1 (using e.g. an appropriately formatted 51-AR message).
As generally shown in step 5611, the source base station 5-I forwards (using its SI-AR module 65) to the target base station 5-2 any remaining downlink data yet to be sent to the mobile communication device 3.
Optionally, as illustrated in step 5612, the source base station 5-1 may generate (using e.g. its Si-AR module 65) and send, to the HeNB GW 8, an appropriately formatted Sl-AP message (e.g. an eNB Status Transfer' SI message) transferring the uplink receiver status and the downlink transmitter status from the source base station 5-1 to the target base station 5-2. In response to this message, on behalf of the MME 9, the HeNB OW 8 generates (using e.g. its 51-AR module 85) and sends, in step S613, an appropriately formatted SI-AR message (e.g. an MME Status Transfer' SI message) to the target base station 5-2, completing the transfer of the uplink receiver status and the downlink transmitter status from the source base station 5-I to the target base station 5-2.
Since non-handover related S1 interface procedures are generally paused while a handover is ongoing (i.e. from the time that a Handover Required message has been received by the HeNB OW 8, at S603), the target base station 5-2 notifies the HeNB OW 8, in step S614, that the handover procedure has succeeded by generating and sending an appropriately formatted Handover Notify' SI-AR message so that the HeNB OW 8 can continue its previously paused Si interface procedures, if any. Although not shown in Figure 6, if the handover fails, the target base station 5-2 generates and sends a Handover Failure' S 1-AR message instead.
Although this step is optional, after the handover has been successfully completed, the HeNB OW 8 may generate (e.g. using its SI-AR module 85) and send, in step S615, an appropriately formatted Si-AR message (e.g. a Location Report' Si-AR message) to the MME 9 informing the MME 9 about the mobile communication device's 3 current location (i.e. the cell of the target base station 5-2 identified by its CR1). Upon receipt of the message at S615, the MME 9 updates the information maintained for this mobile communication device 3 in its UE location module 107, or example by adding the received CPI (and discarding any previously stored CPI).
Finally, the HeNB OW 8 generates (e.g. using its S1-AR module 85) and sends, in step S616, an appropriately formatted Si-AR message (e.g. a UE Context Release Command Si-AR message) to the source base station 5-i instructing the source base station 5-1 to clear any context associated with the mobile communication device 3 that has been handed over to the target base station 5-2. In step S617, the source base station 5-i confirms the release of the context associated with the mobile communication device 3 by sending an appropriately formatted message (e.g. a UF Context Release Complete' SI-AR message) to the HeNB SW 8.
Accordingly, it is possible to carry out a handover from the source base station 5-1 to the target base station 5-2 without involving the MME 9 (other than sending a location update after the handover has been completed), which beneficially reduces the iO signalling required between the core network 7 and the base stations 5.
Operation -second embodiment Figure 7 is an exemplary timing diagram illustrating a method performed by components of the mobile telecommunication system i of Figure i whilst carrying out an embodiment of the invention. In this example, the HeNB SW 8 is configured to derive the target base iS station specific KeNB* instead of the target base station 5-2.
The procedure begins in step S700, in which the MME 9 generates (using its Si-AP module 105) and sends an appropriately formatted message towards the base station 5-i (not currently serving the mobile device 3), instructing the base station 5-i to perform a handover (HO') of the mobile device 3 from another base station currently serving the mobile device 3. In other words, the MME 9 requests the base station 5-i to become the serving base station for the mobile device 3. In this example, the MME's 9 message comprises a Handover Request message, although it may also comprise a Path Switch Request Acknowledge' message and/or the like.
As generally shown in step S70i, the HeNB SW 8 is configured to cache (i.e. store in memory 79) the current KeNB and NCC that are to be used by the base station 5-1 following the handover (denoted HO #1' in Figure 7) for securing communications with the mobile device 3. In this example, the current KOND and NCC are included (e.g. in a security context IF) in the message received from the MME 9 at S700. It will be appreciated that the HeNB SW 8 may be configured to cache the corresponding KONO and NCC for each connected base station 5 when the KeNB and NCC are transferred via the HeNB SW 8, i.e. whenever a handover request, path switch request acknowledge message, and/or the like is received by the HeNB SW 8 for a connected base station 5.
Instep 5702, the HeNB GW8 communicates the MME's 9 message to the base station 5-1 instructing the base station 5-1 to initiate handover (or path switch) procedures from the base station currently serving the mobile device 3. The message at 5702 also includes the current KeNB and NCC (e.g. in a security context IE), obtained from the MME 9, for securing subsequent communications with the mobile device 3.
Although not shown in details in Figure 7, before proceeding to the next step (S703), the new serving base station 5-1 and the previous serving base station complete the handover procedure by performing appropriate data forwarding, status transfer, handover notification, location reporting (towards the MME), and UE context release procedures, as specified in the relevant standards.
The remaining steps of this embodiment form part of a subsequent handover procedure (denoted HO #2' in Figure 7) for the mobile device 3, during which the current serving base station 5-1 (acting as a source base station) initiates handover of the mobile device 3 to the base station 5-2 (acting as a target base station).
As can be seen, step 5703 generally corresponds to step 5603 described with reference to Figure 6. However, in this case the HeNB GW 8 is configured to decode, in step 5704, an information element comprising radio resource management (RRM) configuration (e.g. an RRM-Config' information element, which may form part of e.g. a HandoverPreparationl nformation' information element). The RRM configuration is included in the handover required message sent by the source base station 5-1 (for the target base station 5-2), e.g. in a suitable RRC container. In this example, the RRM-Config' information element conveys the PCI and EARFCN of the target cell (normally intended for the target base station 5-2 for identifying the cell and channel to be used by the mobile communication device 3 after handover). It will be appreciated that the HeNB GVV 8 may be configured to decode (e.g. as shown in step 5704) the RRM configuration every time it receives a handover required message from one of the base stations connected to the HeNB GW8.
As generally shown in step 5705, the HeNB GW 8 (using its security module 89) is therefore able to derive the KeNB* (target base station specific KeNB*) to be applied by the target base station 5-2 (i.e. after the handover has been successfully completed) for the target base station's 5-2 subsequent communications with the mobile communication device 3. Specifically, the security module 89 (of the HeNB GVV 8) is configured to derive the KeNB*, in accordance with the key derivation procedure described with reference to Figure 2, using the PCI and EARFCN of the target cell (included in the RRM-Config' IE from the source base station 5-1) and the current KeNB and NCC (stored in memory 79).
After the target base station specific KeNB* has been derived at step S705, the HeNB OW 8 generates (using its SI-AP module 65) and sends, in step S706, an appropriately formatted signalling message (e.g. a Handover Request' Si-AP message) requesting the target base station 5-2 to perform a handover for the mobile communication device 3 (identified in the request) using an appropriate identifier (e.g. a Global eNB ID') associated with the target base station 5-2 (indicated by the source base station 5-1 at S703). The HeNB OW 8 also includes in this message the KeNB* it has derived at step 5705.
Next, as shown in step 5708, the target base station 5-2 (using its security module 69) starts applying the received KeNB* for the base station's 5-2 communications with the mobile communication device 3 (following successful completion of the handover).
Specifically, using the received KeNB and based on the key derivation procedure illustrated in Figure 2, the target base station 5-2 calculates a new KeNB for securing communications with the mobile communication device 3.
Steps S709 and S710 correspond to steps S609 and S610 of Figure 6, respectively; hence their description is omitted herein for sake of simplicity. The remaining of this embodiment is identical to steps S611 to S617 described with reference to Figure 6.
Operation -third embodiment Figure 8 is an exemplary timing diagram illustrating a method performed by components of the mobile telecommunication system I of Figure 1 whilst carrying out an embodiment of the invention. In this example, the HeNB GW 8 is configured to derive the target base station specific KeNB* instead of the target base station 5-2, based on UE history information provided by the source base station 5-1.
The steps forming part of the first handover procedure (HO #1), i.e. steps S800 to 5802 and the subsequent "handover procedure", are identical to the HO #1 procedure illustrated in Figure 7, thus they will not be discussed here again. However, the subsequent handover procedure (HO #2) of this embodiment is different to the corresponding procedure of the second embodiment described above.
Step 5803 (the first step of the HO #2 procedure) generally corresponds to step 5703 described with reference to Figure 7. However, in this case the HeNB OW 8 is configured to obtain the PCI and EARFCN of the target base station 5-2 from one or more information element included in the handover required message, rather than by decoding the RRM-Config IF / RRC container IF included therein.
In this example, the source base station 5-i is configured to include the PCI and EARFCN in one or more suitable information element, e.g. in a UE History Information' IF and/or a Last Visited F-UTRAN Cell Information' IF included in the handover required message (sent to the HeNB GW 8 at 5803). Specifically, the source base station 5-i (using its Si-AR module 85) adapts the history/cell information IF by adding an indication for the HeNB GW 8 (e.g. by setting the Cell Type' IE to a predetermined value) that the history/cell information IF includes the values of the PCI and FARFCN (rather than actual UF/cell history). In this example, the source base station 5-i includes the PCI in a Global Cell ID' IF of the Last Visited F-UTRAN Cell Information' IF, and includes the EARFCN in a Time UE stayed in Cell' IE of the Last Visited E-UTRAN Cell Information' IF. Some of the information elements that may be adapted to convey the i5 PCI and EARFCN to the HeNB GVV 8 are described in sections 9.2.i.42 to 9.2.i.43b of TS 33.41 3, the contents of which are included herein by reference.
Advantageously, in this case, there is no need for the HeNB GW 8 to decode (as in step S704 of Figure 7) the RRC container included in the message at S803 and look for any RRM-Config' information element in the decoded RRC container because the PCI and FARFCN are included in one or more predetermined (non-RRC encoded) information element of the Si-AP message. This in turn may beneficially reduce the processing required at the HeNB GW 8.
The HeNB GW 8 is also configured to cache the current KeNB and NCC, e.g. as shown in step S80i. Therefore, as generally shown in step S805, the HeNB GVV 8 (using its security module 89) is able to derive the KeNB* (target base station specific KeNB*) to be applied by the target base station 5-2 for the target base station's 5-2 subsequent communications with the mobile communication device 3 (i.e. after successful completion of the HO #2 procedure).
After the target base station specific KeNB* has been derived at step S805, the HeNB GVV 8 generates (using its SI-AR module 65) and sends, in step 5806, an appropriately formatted signalling message (e.g. a Handover Request' Si-AP message) requesting the target base station 5-2 (identified by an appropriate identifier, e.g. a Global eNB ID', associated with the eNB 5-2) to perform a handover for the mobile communication device 3 (identified in the request, e.g. using an associated UE identifier). The HeNB 3W 8 also includes in this message the KeNE* it has derived at step S805.
Next, as shown in step 5808, the target base station 5-2 (using its security module 69) starts applying the received KeNB* for the base station's 5-2 communications with the mobile communication device 3 (following successful completion of the handover procedure, i.e. HO #2). Specifically, using the received KeNB* and based on the key derivation procedure illustrated in Figure 2, the target base station 5-2 calculates a new KeNB for securing communications with the mobile communication device 3.
Steps 5809 and 5810 correspond to steps S609 and 5610 of Figure 6, respectively; hence their description is omitted herein for sake of simplicity. The remaining of this embodiment is identical to steps S611 to S617 described with reference to Figure 6.
Operation -fourth embodiment Figure 9 is an exemplary timing diagram illustrating a method performed by components of the mobile telecommunication system I of Figure 1 whilst carrying out an embodiment of the invention. In this example, the HeNB 3W 8 is configured to obtain some of the information (e.g. the target base station's PCI and EARFCN) needed for deriving the KeNB* from a message setting up the base station to operate with the HeNB 3W 8.
Initially, the base stations 5-1, 5-2 register with the HeNB 3W 8 and MME 9, by generating (using their Si-AR module 65) and sending an appropriately formatted message requesting Si connection setting up the base station 5 to operate with the HeNB 6W 8 and MME 9. This is illustrated generally at step S900. As shown in step S901, the HeNB 3W 8 stores (caches) the PCI and EARFCN information for each base station 5-1, 5-2 that has sent a Si setup request. Although not shown in Figure 9, the HeNB 3W 8 may also generate and send an appropriate confirmation message to each base station 5-i, 5-2 that has sent a Si setup request, to reply the base station that the Si setup has been successful.
In response to the setup request from the base stations 5-i, 5-2, the HeNB 3W 8 generates (using its Si-AR module 65) and sends, in step S902, an appropriately formatted message (e.g. a standard Si Setup Request' Si-AR message, i.e. without including the PCI and the EARFCN information) requesting the MME 9 to set up a respective Si connection for the base stations 5-1, 5-2.
Following the Si setup for each connected base station, the procedure of this embodiment continues with the HO #i procedure (as described with reference to Figure 7 above), which results in the mobile device 3 being served by the base station 5-i.
However, when the base station 5-i subsequently needs to hand over the mobile device 3 to a different base station, the base station 5-i (now acting as the source base station) generates and sends, at step S903, an appropriately formatted signalling message (e.g. a Handover Required' Si-AP message) to the HeNB GW8, requesting the base station 5-2 (acting as the target base station) to become the new serving base station for the mobile device 3. It will be appreciated that the source base station's 5-i message at iO 5903 may comprise a standard Handover Required' Si-AR message (e.g. in order to maintain backward compatibility), although it may also comprise a message as described above with reference to step S703 and/or step S803 above.
Next, the HeNB GVV 8 (using its security module 89) derives the KeNB* (target base station specific KeNB*) to be applied by the target base station 5-2 for subsequent iS communications with the mobile communication device 3. Effectively, after step S903, the HeNB GVV 8 may either proceed to step S705 or S805 and derive the KeNB* (in accordance with the key derivation procedure described with reference to Figure 2) using the PCI and EARFCN of the target cell (included in the setup request at S900) and the current KeNB and NCC (stored in memory 79, following step 570i or S80i of the HO #i procedure, as appropriate).
The remaining of this embodiment is identical to steps S6ii to 56i7 described with reference to Figure 6.
Operation -fifth embodiment Figure iO is a modification of the timing diagram shown in Figure 9. In this example, the HeNB GVV 8 is configured to obtain some of the information (e.g. the target base station's PCI and EARFCN) needed for deriving the KeNB* by communicating with an operation and maintenance (CAM) entity.
Specifically, e.g. instead of (or in addition to) processing an Si setup request for each base station S (as described with reference to steps S900 to S902 of Figure 9), the HeNB GW 8 obtains the PCI and EARFCN needed for deriving the KONB* from the CAM entity. For example, the HeNB GW 8 may obtain the PCI and EARFCN information based on a global cell ID (or los) associated with each base station 5 (to be) connected to this HeNB GW 8. It will be appreciated that the HeNB GW 8 and the CAM entity may carry out a request-response procedure and/or the like, either prior to connecting the base stations 5 to the HeNB GW 8 or as part of setting up the base stations 5 with the network (e.g. as part of step S901 if a preceding setup request does not include the PCI and EARFCN information).
Beneficially, in this case the base stations 5 do not need to include their PCI and EARFCN in the messages (e.g. as in step S900) sent to the HeNB GW 8, which in turn improves backward compatibility and compliance with existing standards.
The remaining of this embodiment is identical to that of Figure 9; hence the description of the subsequent steps is omitted herein for sake of simplicity.
Operation -sixth embodiment Figure 11 is an exemplary timing diagram illustrating a method performed by components of the mobile telecommunication system I of Figure 1 whilst carrying out an embodiment of the invention. In this example, the source base station 5-1 is configured to derive the target base station specific new KeNB instead of the target base station 5-2.
The procedure begins in step S1100, in which the source base station 5-1 generates (using its security module 69) a new KeNB to be used by the target base station 5-2 in its communications with the mobile communication device 3 following a handover of the mobile communication device 3 from the source base station 5-1 to the target base station 5-2.
Next, the source base station 5-1 generates (using its Si-AP module 65) and sends, in step 51103, an appropriately formatted signalling message (e.g. a Handover Required' Si-AP message) to the HeNB GW 8. The source base station 5-1 includes in this message the current NCC and the new KeNE for the target base station 5-2. The current NCC and the new KeNB may be included in e.g. any suitable portion of the message, such as an extension portion that can be understood by the target base station 5-2. The extension' portion in this example comprises an appropriately formatted RRC container information element or a transparent container information element (e.g. a source eNB to target eNB transparent container' information element). Similarly to step S603, the source base station 5-1 also includes in this message the regular' security context IF, in addition to including the current NCC and the new KeNB in the extension portion of the message at S1103.
In response to this message, the HeNB GW 8 generates (using its Si-AR module 85) and sends, in step SiiO6, an appropriately formatted signalling message (e.g. a Handover Request' Si-AR message) requesting the target base station 5-2 to perform a handover for the mobile communication device 3 (identified in the request). The HeNB GW 8 also includes in this message the current NCC and the new KeNB received from the source base station 5-i at SiiO3 -for example, by adding the RRC container information element or transparent container information element received from the source base station 5-i.
In step SiiO7, the target base station 5-2 (using its Si-AR module 65) checks and iO compares the NCC value in the security context IF (included in the message received at SiiO6) to determine whether it is the same as the NCC value included in the extended part of the message from the HeNB GW 8. If the NCC values are the same, the target base station 5-2 ignores any KeNB included in the security context IF and adopts the new KeNB included in the extended part.
iS Next, as generally shown in step SilOS, the target base station 5-2 is set up for applying the new KeNB for the base station's 5-2 subsequent communications with the mobile communication device 3 (i.e. after the handover has been successfully completed).
If the target base station 5-2 is able to comply with the handover request, then it generates (using its Si-AR module 65) and sends, in step SiiO9, an appropriately formatted acknowledgement message (e.g. a Handover Request Ack' Si-AR message) to the HeNB GW 8. In step Si ii 0, the HeNB GW 8 forwards the target base station's 5- 2 handover command to the source base station 5-i (using e.g. an appropriately formatted Si-AR message).
The remaining of this embodiment is identical to steps S6ii to S6i7 described with reference to Figure 6.
Benefits In summary, e.g. as described above with reference to Figure 6, when the target base station obtains the source base station's current KeNE and the associated NCC (via the HeNB GW), the target base station can beneficially derive the required KeNB*, using standard key derivation mechanisms (albeit without requiring involvement of the MME).
Alternatively, e.g. as described above with reference to Figures 7 to iO, when the HeNB GVV obtains the target base station's RCI and EARFCN information (and the source base station's current KeNB and the associated NCC), the HeNB SW is able to derive the KeNB* and provide this KeNB* to the target base station. In this case, there is no need for the target base station to process the source base station's KeNB and NGC.
If the source base station is configured to derive the new KeNB to be used by the target base station, and HeNB SW sends the new KeND (or the KeNOt) to the target base station, it may be possible to reduce the processing required at the HeNB GW and the target base station compared to when the target base station's new KeNE (or KeNB*) is derived by the HeNB SW or the target base station, whilst involvement of the MME can still be avoided.
Finally, the above described handover techniques do not adversely affect the security or standards compliance of communications between the base stations and the mobile communication device because the communications can still be encrypted using the appropriate, target base station specific cryptographic key (KeNB*), without requiring any input from the MME during the handover procedure.
Modifications and Alternatives A number of detailed embodiments have been described above. As those skilled in the art will appreciate, a number of modifications and alternatives can be made to the above embodiments whilst still benefiting from the inventions embodied therein.
In the above description of Figure 1, each base station is described to be a (home) base station operating a small cell (e.g. a pico/femto cell). However, it will also be appreciated that the signalling techniques described in the present application can be employed between any types of base stations, including regular/macro base stations, connected to each other via a gateway (such as the HeNB SW).
It will also be appreciated that the source base station may be configured to derive the KeN6* to be used by the target base station, in which case the source base station may send the target base station specific KeNB* to the target base station (via the HeNB GW) using appropriately formatted Si-AP signalling (and/or using a suitable RRC container and/or a transparent container). This may beneficially result in a reduction of the processing required at the HeNB SW and the target base station compared to when the target base station's KeNB* is derived by the HeNB SW or the target base station, whilst involvement of the MME can still be avoided.
In the above embodiments, the HeNB GVV is described to send the security context (NCC4KeNB pair) and/or the KeNB (or new KeNB) to the target base station in an RRC container information element or a transparent Source eNB to Target eNB' container information element. However, it will be appreciated that the HeNB OW may send the security context (NCC-KeNB pair) and/or the KeNB* (or new KeNB) to the target base station in any suitable information element of the handover request message. It will also be appreciated that the HeNB GW may send the security context (NCC-KeNB pair) and/or the KeNB* (or new KeNB) to the target base station in a separate message, e.g. prior to (or after) sending the handover request message to the target base station.
Whilst the above exemplary embodiments have been described using specific Si-AR messages, it will be appreciated that different SI-AR messages may be used instead.
Further, it will also be appreciated that a different protocol than X2-AP may be used between the base stations and the HeNB OW, for example any other suitable 3GPP protocol, and/or any suitable non-3GPP protocol, such as the Simple Network Management Protocol (SNMP) specified by the Internet Engineering Task Force (IETF) and/or the Technical Report 069 (TR-069) protocol specified by the Broadband Forum.
In the above embodiments, a mobile telephone based telecommunications system was described. As those skilled in the art will appreciate, the signalling techniques described in the present application can be employed in other communications system. Other communications nodes or devices may include user devices such as, for example, personal digital assistants, laptop computers, web browsers, etc. Further, one or more of the base stations may comprise access point(s) of a wireless local area network (WLAN) and/or the like.
In the embodiments described above, the base stations, the gateway, and the mobility management entity each include transceiver circuitry. Typically this circuitry will be formed by dedicated hardware circuits. However, in some embodiments, pad of the transceiver circuitry may be implemented as software run by the corresponding controller.
In the above embodiments, a number of software modules were described. As those skilled in the art will appreciate, the software modules may be provided in compiled or un-compiled form and may be supplied to the base station or to the gateway as a signal over a computer network, or on a recording medium. Further, the functionality performed by part or all of this software may be performed using one or more dedicated hardware circuits. However, the use of software modules is preferred as it facilitates the updating of the base stations, the gateway, and the mobility management entity in order to update their functionalities.
The message for initiating a handover may comprise information for identifying a cell (e.g. a Physical Cell Identity, PCI) and information for identifying a frequency channel (e.g. an Evolved Universal Terrestrial Radio Access Absolute Radio Frequency Channel Number, EARFCN) of said further base station. For example, the information for identifying a cell and the information for identifying a frequency channel may be included in an RRC-encoded part of the message (e.g. in an RRM-Config' IE in an RRC container).
The information for identifying a cell (e.g. a PCI) and the information for identifying a frequency channel (e.g. an EARFCN) of said further base station may be included in one or more information elements (e.g. a UE History Information' information element and/or a Last Visited E-UTRAN Cell Information' information element) configured to convey cell information between said base station and other nodes of said communication system.
The key for securing communications with said mobile communication device may comprise a key (KeNB*) specific to said further base station.
The received key for securing communications with said mobile communication device may comprise a key (e.g. a KeNB) specific to said further base station and said base station may comprise means for deriving a further key (e.g. a KeNB*) specific to said base station using said received key and said associated counter.
The base station may comprise at least one of a macro base station, a pico base station, a femto base station, and a home base station operating in accordance with the Long Term Evolution (LTE) set of standards.
The received key for securing communications with said mobile communication device may be specific to said first base station, and said information for deriving a further key may comprise said received key and said associated counter.
The key for securing communications with said mobile communication device may be specific to said second base station, and said information for deriving a further key may comprise said received key.
The gateway apparatus may further comprise means for obtaining information for identifying a cell (e.g. a Physical Cell Identity, PCI) and information for identifying a frequency channel (e.g. an Evolved Universal Terrestrial Radio Access Absolute Radio Frequency Channel Number, EARFCN) of said second base station. In this case, the means for obtaining information for identifying a cell and information for identifying a frequency channel of said second base station may be operable to perform at least one of: i) obtain said information for identifying a cell and said information for identifying a frequency channel of said second base station by decoding a Radio Resource Control, RRC, container communicated, via said gateway apparatus, between said first base station and said second base station; ii) obtain said information for identifying a cell and said information for identifying a frequency channel of said second base station from one or more information element included in said received message (e.g. a UE History Information' information element and/or a Last Visited E-UTRAN Cell Information' information element); Di) obtain said information for identifying a cell and said information for identifying a frequency channel of said second base station from a message (e.g. a Si Setup Request' message) for setting up said second base station for 51 communication via said gateway apparatus; and iv) obtain said information for identifying a cell and said information for identifying a frequency channel of said second base station from an operations and maintenance (OAM) entity.
The gateway apparatus may comprise at least one of a small cell gateway and a home base station gateway operating in accordance with the Long Term Evolution (LTE) set of standards.
Various other modifications will be apparent to those skilled in the art and will not be described in further detail here.

Claims (20)

  1. CLAIMS: 1. A base station for a communication system, the communication system comprising a mobile communication device, a plurality of base stations, a gateway apparatus operable to facilitate communication of messages between said plurality of base stations, and an mobility management entity via which the gateway apparatus can be connected to a core network, the base station comprising: means for generating a message for initiating a handover of said mobile communication device from said base station to a further base station of said plurality of base stations, the message comprising a security context associated with said mobile communication device, the security context including: a key tor securing communications with said mobile communication device; and a current value of an associated counter for deriving a further key for securing subsequent communications with said mobile communication device; and means for communicating said generated message to said gateway apparatus, the message including said security context.
  2. 2. The base station according to claim 1, wherein said key for securing communications with said mobile communication device comprises a key specific to said further base station.
  3. 3. A base station for a communication system, the communication system comprising a mobile communication device, a plurality of base stations, a gateway apparatus operable to facilitate communication of messages between said plurality of base stations, and an mobility management entity via which the gateway apparatus can be connected to a core network, the base station comprising: means for generating a message for initiating a handover of said mobile communication device from said base station to a further base station of said plurality of base stations, the message comprising information for identifying a cell and information for identifying a frequency channel of said further base station, wherein said information is included in one or more non-radio resource control, non-RRC encoded information elements configured to convey cell information between said base station and other nodes of said communication system; and means for communicating said generated message to said gateway apparatus, the message including said one or more non-RRC encoded information elements.
  4. 4. A base station for a communication system, the communication system comprising a mobile communication device, a plurality of base stations, a gateway apparatus operable to facilitate communication of messages between said plurality of base stations, and an mobility management entity via which the gateway apparatus can be connected to a core network, the base station comprising: means for receiving a message from said gateway apparatus, the message requesting the base station to carry out a handover of said mobile communication device from another base station of said plurality of base stations, the message comprising a security context associated with said mobile communication device, the security context including: a key for securing communications with said mobile communication device; and a current value of an associated counter for deriving a further key for securing subsequent communications with said mobile communication device; means for performing said requested handover of said mobile communication device; and means for securing communications with said mobile communication device using said received key.
  5. 5. The base station according to claim 4, wherein said received key for securing communications with said mobile communication device comprises a key specific to said further base station; and wherein said base station comprises means for deriving a further key specific to said base station using said received key and said associated counter.
  6. 6. The base station according to any of claims 1 to 5, comprising at least one of a macro base station, a pico base station, a femto base station, and a home base station operating in accordance with the Long Term Evolution, LTE, set of standards.
  7. 7. A gateway apparatus for facilitating communication of messages between a plurality of base stations and a core network! the gateway apparatus comprising: means for receiving a message, from a first base station of a plurality of base stations, for initiating a handover of a mobile communication device from said first base station to a second base station of said plurality of base stations, the received message comprising: (a) data to be forwarded to said second base station, said data relating to said handover of said mobile communication device from said first base station to said second base station; (b) a security context associated with said mobile communication device, the security context including: a key for securing communications with said mobile communication device; and a current value of an associated counter for deriving a further key for securing subsequent communications with said mobile communication device; means for generating a message requesting said second base station to carry out a handover of said mobile communication device from said first base station, the generated message comprising information for deriving a further key for securing communications with said mobile communication device, wherein said information for deriving a further key is included in a security context portion forming part of said generated message; and means for sending said generated message to said second base station.
  8. 8. The gateway apparatus according to claim 7, wherein said received key for securing communications with said mobile communication device is specific to said first base station, and wherein said information for deriving a further key comprises said received key and said associated counter.
  9. 9. The gateway apparatus according to claim 7, wherein said key for securing communications with said mobile communication device is specific to said second base station, and wherein said information for deriving a further key comprises said received key.
  10. 10. A gateway apparatus for facilitating communication of messages between a plurality of base stations and a core network, the gateway apparatus comprising: means for obtaining, from a core network node, a security context associated with a mobile communication device, the security context including: a key for securing communications with said mobile communication device; and a current value of an associated counter for deriving a further key for securing subsequent communications with said mobile communication device; means for receiving a message, from a first base station of plurality of base stations, for initiating a handover of said mobile communication device from said first base station to a second base station of said plurality of base stations, the received message comprising data to be forwarded to said second base station, said data relating to said handover of said mobile communication device from said first base station to said second base station; means for generating information for deriving a further key for securing communications with said mobile communication device; means for generating a message requesting said second base station to carry out a handover of said mobile communication device from said first base station, the generated message comprising said information for deriving a further key for securing communications with said mobile communication device, wherein said information is included in a security context portion forming part of said generated message; and means for sending said generated message to said second base station.
  11. 11. The gateway apparatus according to claim 10, further comprising means for obtaining information for identifying a cell and information for identifying a frequency channel of said second base station.
  12. 12. The gateway apparatus according to claim 11, wherein said means for obtaining information for identifying a cell and information for identifying a frequency channel of said second base station is operable to perform at least one of: i) obtain said information for identifying a cell and said information for identifying a frequency channel of said second base station by decoding a Radio Resource Control, RRC, container communicated, via said gateway apparatus, between said first base station and said second base station; U) obtain said information for identifying a cell and said information for identifying a frequency channel of said second base station from one or more information element included in said received message; Ui) obtain said information for identifying a cell and said information for identifying a frequency channel of said second base station from a message for setting up said second base station for communication via said gateway apparatus; and iv) obtain said information for identifying a cell and said information for identifying a frequency channel of said second base station from an operations and maintenance, CAM, entity.
  13. 13. The gateway apparatus according to any of claims 7 to 12, comprising at least one of a small cell gateway and a home base station gateway operating in accordance with the Long Term Evolution, LTE, set of standards.
  14. 14. A communication system comprising a base station according to any of claims 1 to 6; and a gateway apparatus according to any of claims 7to 13.
  15. 15. A method performed by a base station in a communication system, the communication system comprising a mobile communication device, a plurality of base stations, a gateway apparatus operable to facilitate communication of messages between said plurality of base stations, and an mobility management entity via which the gateway apparatus can be connected to a core network, the method comprising: generating a message initiating a handover of said mobile communication device from said base station to a further base station of said plurality of base stations, the message comprising a security context associated with said mobile communication device, the security context including: a key for securing communications with said mobile communication device; and a current value of an associated counter for deriving a further key for securing subsequent communications with said mobile communication device; and communicating said generated message to said gateway apparatus, the message including said security context.
  16. 16. A method performed by a base station in a communication system, the communication system comprising a mobile communication device, a plurality of base stations, a gateway apparatus operable to facilitate communication of messages between said plurality of base stations, and an mobility management entity via which the gateway apparatus can be connected to a core network, the method comprising: generating a message for initiating a handover of said mobile communication device from said base station to a further base station of said plurality of base stations, the message comprising information for identifying a cell and information for identifying a frequency channel of said further base station, wherein said information is included in one or more non-radio resource control, non-RRC, encoded information elements configured to convey cell information between said base station and other nodes of said communication system; and communicating said generated message to said gateway apparatus, the message including said one or more information elements.
  17. 17. A method performed by a base station in a communication system, the communication system comprising a mobile communication device, a plurality of base stations, a gateway apparatus operable to facilitate communication of messages between said plurality of base stations, and an mobility management entity via which the gateway apparatus can be connected to a core network, the method comprising: receiving a message from said gateway apparatus, the message requesting the base station to carry out a handover of said mobile communication device from another base station of said plurality of base stations, the message comprising a security context associated with said mobile communication device, the security context including: a key for securing communications with said mobile communication device; and a current value of an associated counter for deriving a further key for securing subsequent communications with said mobile communication device; performing said requested handover of said mobile communication device; and securing communications with said mobile communication device using said received key.
  18. 18. A method performed by a gateway apparatus, the method comprising: receiving a message, from a first base station of a plurality of base stations, for initiating a handover of a mobile communication device from said first base station to a second base station of said plurality of base stations, the received message comprising: (a) data to be forwarded to said second base station, said data relating to said handover of said mobile communication device from said first base station to said second base station; (b) a security context associated with said mobile communication device, the security context including: a key for securing communications with said mobile communication device; and a current value of an associated counter for deriving a further key for securing subsequent communications with said mobile communication device; generating a message requesting said second base station to carry out a handover of said mobile communication device from said first base station, the generated message comprising information for deriving a further key for securing communications with said mobile communication device, wherein said information for deriving a further key is included in a security context portion forming part of said generated message; and sending said generated message to said second base station.
  19. 19. A method performed by a gateway apparatus, the method comprising: obtaining, from a core network node, a security context associated with a mobile communication device, the security context including: a key for securing communications with said mobile communication device; and a current value of an associated counter for deriving a further key for securing subsequent communications with said mobile communication device; receiving a message from a first base station of plurality of base stations, the message initiating a handover of said mobile communication device from said first base station to a second base station of said plurality of base stations, the received message comprising data to be forwarded to said second base station, said data relating to said handover of said mobile communication device from said first base station to said second base station; generating information for deriving a further key for securing communications with said mobile communication device; generating a message requesting said second base station to carry out a handover of said mobile communication device from said first base station, the generated message comprising said information for deriving a further key for securing communications with said mobile communication device, wherein said information is included in a security context portion forming part of said generated message; and sending said generated message to said second base station.
  20. 20. A computer program product comprising instructions for causing a computer-programmable device to perform a method according to any of claims 15 to 1918.
GB1411149.6A 2014-06-23 2014-06-23 Communication system Withdrawn GB2527518A (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
GB1411149.6A GB2527518A (en) 2014-06-23 2014-06-23 Communication system
US15/318,827 US20170134996A1 (en) 2014-06-23 2015-06-22 Communication system adapted for key derivation during handover
JP2016575244A JP6292427B2 (en) 2014-06-23 2015-06-22 Communication system adapted for key derivation during handover
EP15736058.7A EP3158784A1 (en) 2014-06-23 2015-06-22 Communication system adapted for key derivation during handover
PCT/JP2015/068595 WO2015199241A1 (en) 2014-06-23 2015-06-22 Communication system adapted for key derivation during handover
CN201580034346.6A CN106416334A (en) 2014-06-23 2015-06-22 Communication system adapted for key derivation during handover

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1411149.6A GB2527518A (en) 2014-06-23 2014-06-23 Communication system

Publications (2)

Publication Number Publication Date
GB201411149D0 GB201411149D0 (en) 2014-08-06
GB2527518A true GB2527518A (en) 2015-12-30

Family

ID=51409993

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1411149.6A Withdrawn GB2527518A (en) 2014-06-23 2014-06-23 Communication system

Country Status (6)

Country Link
US (1) US20170134996A1 (en)
EP (1) EP3158784A1 (en)
JP (1) JP6292427B2 (en)
CN (1) CN106416334A (en)
GB (1) GB2527518A (en)
WO (1) WO2015199241A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107529231A (en) * 2016-06-17 2017-12-29 凯瑟雷恩工厂两合公司 For providing multiple mobile radios cellular mobile radio Transmission system in building or campus

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105850167B (en) 2013-12-24 2019-07-23 日本电气株式会社 Equipment, system and method used in SCE
US11026136B2 (en) 2014-03-07 2021-06-01 Parallel Wireless, Inc. Handovers with simplified network topology
US10595242B2 (en) 2014-03-07 2020-03-17 Parallel Wireless, Inc. Federated X2 gateway
US10743217B2 (en) 2014-03-07 2020-08-11 Parallel Wireless, Inc. X2 brokering between inter-3GPP release eNodeB's
US9948548B2 (en) * 2015-08-27 2018-04-17 Cisco Technology, Inc. System and method for providing small cell gateway redundancy
WO2017084043A1 (en) * 2015-11-18 2017-05-26 Alcatel-Lucent Shanghai Bell Co., Ltd. Handover between e-utran and wlan
US10368238B2 (en) * 2015-12-01 2019-07-30 Htc Corporation Device and method of handling data transmission/reception for dual connectivity
US10313933B2 (en) 2016-04-01 2019-06-04 Lg Electronics Inc. Method and apparatus for enhancing mobility for 3GPP LTE-WLAN aggregation in wireless communication system
US10211907B1 (en) 2016-05-26 2019-02-19 Sprint Spectrum L.P. Coordinated multipoint mode selection for relay base station
EP3520316B1 (en) * 2016-09-29 2022-03-02 Parallel Wireless, Inc. Handovers with simplified network topology
US10868803B2 (en) 2017-01-13 2020-12-15 Parallel Wireless, Inc. Multi-stage secure network element certificate provisioning in a distributed mobile access network
US10237759B1 (en) * 2017-03-29 2019-03-19 Sprint Spectrum L.P. Coordinated multipoint set selection based on donor status
CN108924829B (en) * 2017-04-07 2022-05-24 中兴通讯股份有限公司 Method and device for sending and processing uplink data and authenticating
CN109309920B (en) * 2017-07-28 2021-09-21 华为技术有限公司 Security implementation method, related device and system
US10812973B2 (en) * 2017-10-19 2020-10-20 Futurewei Technologies, Inc. System and method for communicating with provisioned security protection
US11190510B2 (en) 2017-11-15 2021-11-30 Parallel Wireless, Inc. Two-factor authentication in a cellular radio access network
US10750563B2 (en) * 2018-05-09 2020-08-18 Htc Corporation Device and method for handling a fallback
CN110913393B (en) * 2018-09-15 2021-09-07 华为技术有限公司 Switching method and terminal equipment
CN112789896B (en) * 2019-01-07 2022-06-14 华为技术有限公司 Method and device for switching transmission path
EP3944669A4 (en) * 2019-03-22 2022-04-27 Sony Group Corporation Communication control device and method, and communication terminal and method
KR20220046612A (en) * 2019-08-13 2022-04-14 구글 엘엘씨 Systems and methods for handling radio resource control inactivity conditions

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20110123662A (en) * 2010-05-07 2011-11-15 삼성전자주식회사 Method and apparatus for performing handover
WO2014120077A1 (en) * 2013-01-30 2014-08-07 Telefonaktiebolaget L M Ericsson (Publ) Security key generation for dual connectivity
EP2787752A1 (en) * 2011-12-27 2014-10-08 Huawei Technologies Co., Ltd Inter-base station carrier aggregation security communication method and device

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070154015A1 (en) * 2005-12-29 2007-07-05 Lucent Technologies Method for cipher key conversion in wireless communication
US8311512B2 (en) * 2007-06-21 2012-11-13 Qualcomm Incorporated Security activation in wireless communications networks
US20090274302A1 (en) * 2008-04-30 2009-11-05 Mediatek Inc. Method for deriving traffic encryption key
US20100173610A1 (en) * 2009-01-05 2010-07-08 Qualcomm Incorporated Access stratum security configuration for inter-cell handover
US9681292B2 (en) * 2009-08-17 2017-06-13 Telefonaktiebolaget Lm Ericsson (Publ) Method for handling ciphering keys in a mobile station
US20120163336A1 (en) * 2010-06-18 2012-06-28 Interdigital Patent Holdings, Inc. Distributed architecture for security keys derivation in support of non-involved core network handover
KR101730088B1 (en) * 2010-06-28 2017-04-26 삼성전자주식회사 Wireless communication system and method for processing handover thereof
CN102340772B (en) * 2010-07-15 2014-04-16 华为技术有限公司 Security processing method, device and system in conversion process

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20110123662A (en) * 2010-05-07 2011-11-15 삼성전자주식회사 Method and apparatus for performing handover
EP2787752A1 (en) * 2011-12-27 2014-10-08 Huawei Technologies Co., Ltd Inter-base station carrier aggregation security communication method and device
WO2014120077A1 (en) * 2013-01-30 2014-08-07 Telefonaktiebolaget L M Ericsson (Publ) Security key generation for dual connectivity

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ERICSSON, ST-ERICSSON: "Security in dual connectivity", 3GPP DRAFT; R2-131671 - SECURITY IN DUAL CONNECTIVITY, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, R2-13167, 10 May 2013 (2013-05-10), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP050699824 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107529231A (en) * 2016-06-17 2017-12-29 凯瑟雷恩工厂两合公司 For providing multiple mobile radios cellular mobile radio Transmission system in building or campus

Also Published As

Publication number Publication date
JP2017521935A (en) 2017-08-03
CN106416334A (en) 2017-02-15
US20170134996A1 (en) 2017-05-11
JP6292427B2 (en) 2018-03-14
WO2015199241A1 (en) 2015-12-30
EP3158784A1 (en) 2017-04-26
GB201411149D0 (en) 2014-08-06

Similar Documents

Publication Publication Date Title
JP6292427B2 (en) Communication system adapted for key derivation during handover
US11272410B2 (en) Communication system
JP6399118B2 (en) Mobile communication system, base station, and methods thereof
CN105557006B (en) User equipment in communication system and method for communication by same
KR101552303B1 (en) Communication system and method for transffering data therein
EP2982146B1 (en) Transport network layer address discovery with x2-gateway
US10064115B2 (en) Method and apparatus for handover in dual connectivity user equipment and base station
KR101486824B1 (en) Relaying communications in advanced lte systems
US10251100B2 (en) Methods, source network node and target network node for handover of a wireless communication device
JP2018102013A (en) Communication system with X2 gateway
KR20170098826A (en) Handover using dual active connections
CN104349309A (en) Method utilizing NN and NCC pairs to solve safety problems in mobile communication system
US20190116546A1 (en) Method for notifying downlink data in a network, network triggered service request method, and network entity performing the same
US9503393B2 (en) S-GW relocation and QoS change without mobility
WO2016026088A1 (en) Path switching method, mobile anchor point and base station
WO2017193555A1 (en) Cell handover method and system
EP3554129B1 (en) Cell handover method and device
EP3520316B1 (en) Handovers with simplified network topology
KR20200018543A (en) SCHEME FOR Security key management for PDCP distribution in dual connectivity

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)